The Target Data Breach: What We Can All Learn From It?

What is believed, as well as speculated, to have occurred- step by step

Which technologies may have been useful at reducing the risk at each step and why

An aggregate set of security considerations we should all keep in mind as we look to reduce the security risk of targeted attacks in our own organizations

There is rarely a crystal clear picture, nor a set of practices guaranteed to stop attacks like this one. But there are always lessons to be learned and decisions to be made about managing risk vs. cost.